Networks - Data Security/Technology

Sage Intacct
Tuesday, October 1, 2019

High performing CFOs in financial services organizations integrate data-driven decision-making activities across the entire company, changing the role of finance from back-room financial reporters into forward-thinking analysts and trusted advisors.

Warner Norcross & Judd LLP
Friday, September 20, 2019

Family offices and family businesses are frequent targets for cyberattacks because they do not realize their vulnerabilities and often do not have a cybersecurity plan in place. There are six steps that can help offices start creating a plan to prepare for and respond to a system breach.

Chubb Personal Risk Services
Monday, September 9, 2019

The financial damages of cyber crime are projected to reach $6 trillion annually by 2021—more than double those same figures from 2015. That’s why it’s important to not only stay on top of the latest trends in the cyber security industry, but to also stay ahead of them.

Overview

Risk Strategies Company
Thursday, August 8, 2019

Ransomware has become prevalent and can cause significant downtime and leaving businesses with no choice but to pay the ransom.

Erin Hulse, Founder – Deviate Consulting, LLC
Wednesday, August 7, 2019

The software selection process can be overwhelming and time-consuming. What are the options, what functionality do they offer, and how much do they cost?

Rob Rosenzweig, Risk Strategies Company
Friday, August 2, 2019

With the implementation of California Consumer Privacy Act (CCPA) set to go into effect January 1, 2020, anyone doing businesses with California residents should not only be preparing their digital strategies to comply with the new law, they should also be assessing their risk and reviewing their

Aaron Turner, Risk Strategies Company
Wednesday, July 31, 2019

While far-reaching cyberattacks targeting the Internet of Things (IoT) devices hasn’t happened yet, it will in the not-too-distant future.

Bob Courtemanche, Risk Strategies Company
Tuesday, July 23, 2019

Posting fabulous vacation moments on Facebook—from a boat in Belize, to the top of a mountain at Chamonix—might be a fun way to share experiences with your friends, but it’s also a great way to let bad actors know your home is empty and ripe for a break-in.

Warner Norcross & Judd
Friday, September 20, 2019

Most professionals understand that work emails can be “discovered” in litigation, meaning that adverse parties can obtain these communications if they are relevant to the dispute.